General

  • Target

    Balatro_1.0.1g.apk

  • Size

    59.7MB

  • Sample

    250209-peczaszngn

  • MD5

    b27bab1cae92663538e25cf66de33e10

  • SHA1

    d80a2e707bc4941fd3cce661d0d2717e0c9005c4

  • SHA256

    88b3bbe33359ab337b804d0da7802fc38ba80be0030e3c514db3934d7714b8b3

  • SHA512

    f0bfe0cd54e8c0db097e46f63ed1e60cb64a104a47a8734809ac3d95c5e8cfdc0c5c690801ab303d760a15575e6d7f46d36dd8b4b5443e79c1cc9657c6c59310

  • SSDEEP

    1572864:L6cdRDeIp8ZWXVidi2aNxCU47PnWRH1zOAVeeSmMbscTuQ:+cdRDJp8ZWl+ECUKLAV+mYsQ

Malware Config

Targets

    • Target

      Balatro_1.0.1g.apk

    • Size

      59.7MB

    • MD5

      b27bab1cae92663538e25cf66de33e10

    • SHA1

      d80a2e707bc4941fd3cce661d0d2717e0c9005c4

    • SHA256

      88b3bbe33359ab337b804d0da7802fc38ba80be0030e3c514db3934d7714b8b3

    • SHA512

      f0bfe0cd54e8c0db097e46f63ed1e60cb64a104a47a8734809ac3d95c5e8cfdc0c5c690801ab303d760a15575e6d7f46d36dd8b4b5443e79c1cc9657c6c59310

    • SSDEEP

      1572864:L6cdRDeIp8ZWXVidi2aNxCU47PnWRH1zOAVeeSmMbscTuQ:+cdRDJp8ZWl+ECUKLAV+mYsQ

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks